A number of vulnerabilities are specifically related to problems in
creating, managing, or removing alternate channels and alternate paths. Some
of these can overlap virtual file problems. They are commonly used in
"bypass" attacks, such as those that exploit authentication errors.

Research Gaps

Most of these issues are probably under-studied. Only a handful of public
reports exist.